Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use WritableDir in execute_cmdstager for exploit/linux/http/f5_bigip_tmui_rce #14003

Merged
merged 1 commit into from Aug 15, 2020

Conversation

wvu
Copy link
Contributor

@wvu wvu commented Aug 15, 2020

Since we're using WritableDir in script_path for upload_script, we can also use it in :temp for execute_cmdstager.

msf6 exploit(linux/http/f5_bigip_tmui_rce) > grep WritableDir advanced
   WritableDir             /tmp                                                yes       Writable directory
msf6 exploit(linux/http/f5_bigip_tmui_rce) >

https://github.com/rapid7/rex-exploitation/blob/9c19df14e66d381e318996478e5d55018a6061c6/lib/rex/exploitation/cmdstager/base.rb#L26-L31

Fixes #13807. Bughancement.

@wvu wvu self-assigned this Aug 15, 2020
@wvu wvu merged commit dd7cc72 into rapid7:master Aug 15, 2020
@wvu wvu deleted the bug/f5 branch August 15, 2020 02:49
@wvu
Copy link
Contributor Author

wvu commented Mar 27, 2021

You forgot about #11467, didn't you?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant